Stored Cross-Site Scripting Vulnerability in Jenkins Dynamic Extended Choice Parameter Plugin by Jenkins
CVE-2022-36902

5.4MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
27 July 2022

Summary

The Jenkins Dynamic Extended Choice Parameter Plugin versions up to 1.0.1 contain a vulnerability that allows for stored cross-site scripting. This issue arises because the plugin does not properly escape multiple fields associated with Moded Extended Choice parameters. An attacker with Item/Configure permissions can exploit this vulnerability to execute arbitrary JavaScript in the context of the users interacting with the affected system, potentially leading to unauthorized actions and data exposure.

Affected Version(s)

Jenkins Dynamic Extended Choice Parameter Plugin <= 1.0.1

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.